CVE-2019-11555

The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly state properly for a case where an unexpected fragment could be received. This could result in process termination due to a NULL pointer dereference (denial of service). This affects eap_server/eap_server_pwd.c and eap_peer/eap_pwd.c.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.9 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 93%
VendorProductVersion
w1.fihostapd
𝑥
< 2.8
w1.fiwpa_supplicant
𝑥
< 2.8
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
wpa
bullseye
2:2.9.0-21+deb11u2
fixed
bullseye (security)
2:2.9.0-21+deb11u2
fixed
bookworm
2:2.10-12+deb12u2
fixed
bookworm (security)
2:2.10-12+deb12u2
fixed
sid
2:2.10-22
fixed
trixie
2:2.10-22
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
wpa
disco
Fixed 2:2.6-21ubuntu3.1
released
cosmic
Fixed 2:2.6-18ubuntu1.2
released
bionic
Fixed 2:2.6-15ubuntu2.3
released
xenial
Fixed 2.4-0ubuntu6.5
released
trusty
Fixed 2.1-0ubuntu1.7+esm1
released
References